Home Start Back Next End
  
56
2.2.7.2 Authentication
According
to
Satzinger,
Jackson,
Burd
authentication¹
is
the
process
of identifying users (that is, the authorized or registered users) who
request access to sensitive resources. Authentication is the basis of all
security 
because 
security 
controls 
are 
useless 
unless 
the 
user 
is
correctly identified. In many operating systems, authentication requires
the
user
to
enter
a
user
name
and
password.
The
user
is
autheticated
if
the  password  he  or  she  enters  matches  the  password  stored  in  the
security database.
2.2.7.3 Password
According
to
wikipedia.org
18
,
a password
is
a
form
of
secret
authentication
data
that
is
used
to
control
access
to
a
resource.
The
password is kept secret from those not allowed access, and those
wishing
to
gain
access
are
tested on whether or not they know the
password and are granted or denied access accordingly. In this modern
era, passwords are used to control access
to protected computer
operating systems, mobile phones, cable TV decoders, automated teller
machines (ATM).
A
typical computer
user
may require passwords
for
17
Satzinger, Jakson, Burd (2004). Systems Analysis and Design in a Changing World. 3rd ed.Boston:
Thomson Course Technology. p608.
18
Wikimedia. (2007). Password. Available:
Word to PDF Converter | Word to HTML Converter